Search Results - (( data distribution detection algorithm ) OR ( java application based algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Distributed Online Averaged One Dependence Estimator (DOAODE) Algorithm for Multi-class Classification of Network Anomaly Detection System by R.Badlishah, Ahmad, Nawir, M., Amir, A, Yaakob, N, Mat Safar, A, Mohd Warip, M.N, Zunaidi, I

    Published 2019
    “…Therefore, this paper aims to develop an effective and efficient network anomaly detection system by using distributed online averaged one dependence estimator (DOAODE) classification algorithm for multi-class network data to overcome these issues. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Distributed Online Averaged One Dependence Estimator (DOAODE) Algorithm for Multi-class Classification of Network Anomaly Detection System by Badlishah, Ahmad, Nawir, M., Amir, A, Yaakob, N, Mat Safar, A, Mohd Warip, M.N, Zunaidi, I

    Published 2019
    “…Therefore, this paper aims to develop an effective and efficient network anomaly detection system by using distributed online averaged one dependence estimator (DOAODE) classification algorithm for multi-class network data to overcome these issues. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  5. 5

    High Impedance Fault Detection on Power Distribution Feeder by Sulaiman , Marizan, Tawafan, Adnan, Ibrahim, Zulkifilie

    Published 2012
    “…The results show that the proposed algorithm can distinguish successfully HIFs from other events in distribution power system.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Broken Conductor Detection on Power Distribution Feeder by Sulaiman , Marizan, Tawafan, Adnan, Ibrahim, Zulkifilie

    Published 2013
    “…It proposes an intelligent algorithm using the Fuzzy Subtractive Clustering Model (FSCM) to detect the high impedance fault. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Detecting High Impedance Fault in Power Distribution Feeder with Fuzzy Subtractive Clustering Model by Sulaiman , Marizan, Adnan, Tawafan, Ibrahim, Zulkifilie

    Published 2013
    “…This paper presents the algorithm for HIF detection based on the amplitude of third and fifth harmonics of current, voltage and power. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan by Ullah, S., Daud, H., Dass, S.C., Hadi, F.-T., Khalil, A.

    Published 2018
    “…Identifying the abnormally high-risk regions in a spatiotemporal space that contains an unexpected disease count is helpful to conduct surveillance and implement control strategies. The EigenSpot algorithm has been recently proposed for detecting space-time disease clusters of arbitrary shapes with no restriction on the distribution and quality of the data, and has shown some promising advantages over the state-of-the-art methods. …”
    Get full text
    Get full text
    Article
  10. 10

    An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan by Ullah, S., Daud, H., Dass, S.C., Hadi, F.-T., Khalil, A.

    Published 2018
    “…Identifying the abnormally high-risk regions in a spatiotemporal space that contains an unexpected disease count is helpful to conduct surveillance and implement control strategies. The EigenSpot algorithm has been recently proposed for detecting space-time disease clusters of arbitrary shapes with no restriction on the distribution and quality of the data, and has shown some promising advantages over the state-of-the-art methods. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S., Al-Jumaily A.

    Published 2025
    “…The hybrid algorithm was implemented to minimise the length of time needed to address the massive scale of the detected parallel power load abnormalities. …”
    Article
  13. 13

    Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi by Sherksi, Nasereddin Ibrahim

    Published 2020
    “…The system is simulated using EPANET (Environmental Prediction Agency Network) software based on actual water distribution system (WDS) data from Benghazi city, Libya. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…One of the challenging issues for a grid-connected distributed generation is to find a suitable technique to detect an islanding problem. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph
  16. 16

    Adaptive Neural Subtractive Clustering Fuzzy Inference System for the Detection of High Impedance Fault on Distribution Power System by Tawafan, Adnan, Sulaiman , Marizan, Ibrahim, Zulkifilie

    Published 2012
    “…The algorithm for HIF detection based on the amplitude ratio of second and odd harmonics to fundamental is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18
  19. 19

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
    Get full text
    Get full text
    Get full text
    Article